General

  • Target

    99544ecb7f197bf2a4fbe3f2bd915eab_JaffaCakes118

  • Size

    30.7MB

  • Sample

    240605-1mkjwsba59

  • MD5

    99544ecb7f197bf2a4fbe3f2bd915eab

  • SHA1

    7de1c5ae5daa86bbaf2064e53ae0dfcabb2b9217

  • SHA256

    60815ff0818b32c789864d72bda2bb194514c79eaf12e211524820d6193ff1e7

  • SHA512

    34861588253c829ea1a9dedda6d8042cc6f6280ffc9fe0a67cf89b55892fdd99a3627672a9011ed1493f3c5a80c69c385aa2f5b07feef96990611a16bf251dfb

  • SSDEEP

    786432:Gj2VfjeY+czNv96gfRwMxLJxtCMkQixUOQ4KAR4HbLjzl0HO5:Ge/lxv+uJL5kQMUz4ZwLjzlKE

Malware Config

Targets

    • Target

      99544ecb7f197bf2a4fbe3f2bd915eab_JaffaCakes118

    • Size

      30.7MB

    • MD5

      99544ecb7f197bf2a4fbe3f2bd915eab

    • SHA1

      7de1c5ae5daa86bbaf2064e53ae0dfcabb2b9217

    • SHA256

      60815ff0818b32c789864d72bda2bb194514c79eaf12e211524820d6193ff1e7

    • SHA512

      34861588253c829ea1a9dedda6d8042cc6f6280ffc9fe0a67cf89b55892fdd99a3627672a9011ed1493f3c5a80c69c385aa2f5b07feef96990611a16bf251dfb

    • SSDEEP

      786432:Gj2VfjeY+czNv96gfRwMxLJxtCMkQixUOQ4KAR4HbLjzl0HO5:Ge/lxv+uJL5kQMUz4ZwLjzlKE

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks